show episodes
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork

1
Shared Security Podcast

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Chaque semaine
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Join Stanford GSB finance professor Jonathan Berk and Jules van Binsbergen of The Wharton School in a conversation with prominent business leaders about common flaws in the decision making process and what to do about them. Learn more at AllElseEqualPodcast.com.All Else Equal: Making Better Decisions Podcast is a production of Stanford Graduate School of Business and is produced by University FM.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

Unsubscribe
Unsubscribe
Chaque semaine
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Artwork

1
Off The Hook

2600 Enterprises

Unsubscribe
Unsubscribe
Chaque semaine
 
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @OffTheHook@hackers.town
  continue reading
 
Artwork

1
The MBA Way

Erik Solbakken, BA, CA, CPA

Unsubscribe
Unsubscribe
Chaque mois+
 
The MBA Way Podcast brings resources and advice to Canadian business owners with a splash of entertainment. We interview thought leaders, business advisors and other successful business owners to help grow your business AND your life. Got to www.mbacpa.ca to find out more about how MBA Chartered Professional Accountants can help you with your accounting, tax and advisory needs.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Chaque mois
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
Dissecting Popular IT Nerds

Dissecting Popular IT Nerds

Unsubscribe
Unsubscribe
Chaque semaine+
 
Leading IT into the future as a business force multiplier. Discover how IT Business Executives are impacting the business world, growing their careers, and influencing end-users without sacrificing work life balance AND never worrying about money again. *****DISCLAIMER***** All views, opinions, and statements made by guests on this show do not represent the beliefs of Phil Howard, or any entity whatsoever with which I have been, am now, or will be affiliated. Any statements, views, random th ...
  continue reading
 
Artwork

1
Cookies: Tech Security & Privacy

Princeton University School of Engineering and Applied Science

Unsubscribe
Unsubscribe
Chaque mois
 
Technology has transformed our lives, but there are hidden tradeoffs we make as we take advantage of these new tools. Cookies, as you know, can be a tasty snack -- but they can also be something that takes your data. This podcast is presented by the Princeton University School of Engineering and Applied Science.
  continue reading
 
Artwork

1
Techstrong AI Podcast

Techstrong Group

Unsubscribe
Unsubscribe
Chaque semaine
 
Tune in to hear Amanda Razani and Mike Vizard share valuable insights as they explore the latest in artificial intelligence news, discuss key issues and speculate on the future of AI, LLMs and machine learning.
  continue reading
 
Ask Maria https://podcasters.spotify.com/pod/show/maria-florio/subscribe Being Yourself Empowered Woman Restorative Embodiment Secure Attachment Podcast Host Voices, Stories and Perspectives For Self-Help, Personal Development | Sharing the Infinite Higher Human Consciousness Potential Experience, the Keys to Inner Growth and Following your Heart, and Bringing Together Human, Spiritual and Spirituality Elements to Explore Human Evolution and Consciousness | 5D Mystic Enlightenment Woo-Woo St ...
  continue reading
 
Artwork

1
Fearless with Cissie Graham Lynch

Billy Graham Evangelistic Association

Unsubscribe
Unsubscribe
Chaque mois+
 
Through the Fearless podcast, Cissie Graham Lynch―daughter of Franklin Graham and granddaughter of Billy Graham―shares personal experiences of how God has worked through her life. Each episode will take a look at different subjects and explore what the Bible teaches about those topics―encouraging listeners to explore God’s Word for themselves so that they know what they believe and why they believe it; challenging them to stand boldly for the Gospel of Jesus Christ in an ever-compromising world.
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Another Progressive Podcast. Like all the others. But also different. A show taking an in depth look at the political issues pundits and commentators dedicate just a few talking points to. Focusing on the arguments of Ben Shapiro, Charlie Kirk, Dave Rubin, and the whole New Right, I'll be explaining why they are so flawed, and why we maybe should not take the brave defenders of Facts and Logic so seriously. But also sometimes we won't talk about them. Hosted by Max Deutsch.
  continue reading
 
Are you a cybersecurity professional who wants to be updated with the latest industry news, emerging threats and challenges but you've got no time to wade through white papers or the tech press? Are you a passionate person about cybersecurity who just wants to learn more on how to protect information? We've got you covered. The Cyberstar Talk's Podcast allows you to stay up to date as you’re going on with your daily grind. This channel will provide you with a bunch of exclusive and best inte ...
  continue reading
 
Tech news, tech debates, and more!! Listen to Tech Time with Lucas and David for all your tech news! Have your opinion featured on the show, or suggest topics for us to talk about by emailing us at techtimepodcast1@gmail.com or leaving us a message on skype: techtimepodcast
  continue reading
 
Loading …
show series
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ken Athanasiou, CISO, VF Corporation Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Aut…
  continue reading
 
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches. The episode also covers a notable Okta vulnerability that allowed so…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
Three Buddy Problem - Episode 20: We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP content is for people who are interested in topics, stories, & guidance for spiritual, self-help, personal development, spirituality journey, the 5D mystic path, & enlightenment the human way. The content resonates with the human love narrative, not the human suffering narrative. Don't tune in if you don't love life & humanity because this won'…
  continue reading
 
Interlock ransomware gang aims at U.S. healthcare, IT and government Canada tells TikTok to dissolve its Canadian business Hewlett Packard warns of critical RCE flaws in Aruba Networking software Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on man…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
Nokia says it has no evidence that hackers breached company data Nigerian cybercrime bust arrests 130 people 200,000 SelectBlinds customers impacted by e-skimmer Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Q…
  continue reading
 
In this episode of the Unsecurity Podcast, FRSecure's CFO, Vanae Pearson, and Illumifin's Chief Security Officer, Randy Kaedar are guests. The group discusses how to prompt key decision makers and executive teams to make the most effective security decisions. Don't forget: The show is available in audio-only form wherever you listen to podcasts! Pl…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
ElizaRAT hits India IT outage impacts Washington courts Alleged Snowflake hacker arrested Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, security & compliance teams can complete securi…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
Schneider Electric breached for second time this year U.S. says Russia behind fake Haitian voter video Ohio’s capital city faces lawsuits for handling of ransomware attack Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. Wi…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
It’s hard to believe Election Day is tomorrow. No matter which side of the aisle you’re on, we can be sure there is a battle still in front of us – but the battle ahead is not ours, it’s God’s. We need to remember to trust God. We don’t know what the results of the election will be, but God does and we can trust Him with tomorrow. We do not have to…
  continue reading
 
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. We explore the implications of this significant breach and whether paying ransoms is a viable solu…
  continue reading
 
Microsoft Entra “security defaults” to make MFA setup mandatory Ransomware attack hits German pharmaceutical wholesaler AEP Upgraded LightSpy spyware targets iPhones with more destructive power Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manua…
  continue reading
 
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. We explore the implications of this significant breach and whether paying ransoms is a viable solu…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
Three Buddy Problem - Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bra…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for spiritual, self-help, personal development, spirituality journey, the 5D mystic path, & enlightenment the human way. The content resonates with the human love narrative, not the human s…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest David Cross, SVP/CISO, Oracle. Also check out David’s travel blog and recent “Secure by Default” white paper at IT ISAC. Thanks to our show sponsor, Dropzone AI Security operations are evolving, and AI is leading the way. Dropzone AI …
  continue reading
 
Peruvian bank warns of data theft after dark web revelations Windows 11 Task Manager displays wrong number of running processes CyberPanel sees vulnerabilities exploited soon after disclosure Thanks to today's episode sponsor, Dropzone AI Security operations are evolving, and AI is leading the way. Dropzone AI autonomously investigates 100% of your…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
CISA launches International Cybersecurity Plan North Korean hackers tied to Play ransomware FakeCall learns new tricks Thanks to today's episode sponsor, Dropzone AI Tired of false positives slowing your SOC down? Dropzone AI uses advanced AI to filter out the noise and focus on real threats. 24/7, every alert, no manual intervention. Want to learn…
  continue reading
 
IHP YouTube video podcast episode made available to our other IHP podcast platforms. IHP content is for people who are interested in topics, stories, & guidance for personal development, self-help, spirituality journey, the 5D mystic path, & enlightenment the human way. It's for those who choose the human love narrative, not the human suffering nar…
  continue reading
 
If the purpose of a proxy advisory firm is to gather information and advise shareholders on how to vote, then how do the firms handle the many different goals and incentives each shareholder brings to the table? Where do the proxy advisory firms’ interests truly lie? In this episode, hosts and finance professors Jonathan Berk and Jules van Binsberg…
  continue reading
 
Loading …

Guide de référence rapide